To make this website work, we log user data. By using Shephard's online services, you agree to our Privacy Policy, including cookie policy.

×
Open menu Search

Search Results We've found 1384 articles

Results not accurate enough? Try using double quotation marks around your search term for an exact search.

News - cyber

  • Training

    Alion to provide US personnel with JTSE

    23rd May 2018

    Alion Science and Technology has received a $34.9 million contract from the Defense Technical Information Center (DTIC) to provide Joint Training Synthetic Environment (JTSE) for …

  • Digital Battlespace

    EW Europe 2018: Race to militarise AI heats up

    31st May 2018

    Touted as a game changing technology for defence systems, the race to exploit the battlefield potential of AI has heated up in recent years, contributing …

  • Digital Battlespace

    Advenica receives FMV encryption products order

    14th May 2018

    Advenica has received an order worth $2.2 million from the Swedish Defence Materiel Administration (FMV) to provide hardware encrypted Virtual Private Network (VPN) products, the …

  • Military Logistics

    IoT expands bot armies

    17th May 2018

    The rapidly expanding ‘Internet of Things’ (IoT) is significantly reinforcing the size and effect of the so-called ‘bot armies’ employed in Distributed Denial of Service …

  • Defence Notes

    Sweden puts out emergency war pamphlet amid Russia fears

    21st May 2018

    The Swedish government on 21 May presented an emergency pamphlet to prepare millions of citizens in the event of a war, natural disaster or cyber …

  • Training

    ITEC 2018: Thales secures EDITH contract in Hungary

    17th May 2018

    During a briefing at ITEC 2018 by Thales VP training & simulation, Benoit Plantier, it emerged that Thales is under contract from Hungary to supply …

  • Defence Notes

    Taiwan faces defence export challenges

    25th May 2018

    Taiwan’s defence industry is struggling to enter the US defence global supply chain, despite its procurement of billions of dollars of US equipment over the …

  • Special Operations

    SOFIC 2018: SOF increasingly rely on soft power

    16th May 2018

    Global special operations forces are becoming increasingly reliant on ‘soft power’ to increase their relevance and mission success across the contemporary operating environment (COE), the …

  • Military Logistics

    US sees threats to global power projection

    17th May 2018

    The United States is facing threats to its ability to project power on a global basis. That was one of the messages from 15 May …

  • Special Operations

    SOFIC 2018: JSOC to reveal technology interest areas

    16th May 2018

    The US Joint Special Operations Command (JSOC) has revealed a hit-list of technology interest areas due to be exploited over the course of 2018 in …

  • Digital Battlespace

    CIA faces crippling challenges in China

    17th May 2018

    China’s perfection of facial recognition and gait detection software, integrated into algorithms that have access to millions of profiles of ‘blacklisted’ individuals, would give Cold …

  • Digital Battlespace

    Portugal joins NATO cyber-defence centre

    25th April 2018

    Portugal on 24 April became the 21st country to join NATO's cyber defence centre, the Tallinn-based body said at a flag-raising ceremony. ‘We are facing …

  • Land Warfare

    US Army grapples with future operating concepts

    10th May 2018

    As the threat from near-peer adversaries looms once again over Western nations, the US is having to re-learn operating concepts that have laid dormant for …

  • Digital Battlespace

    DSA 2018: Black Tiger enters Asia

    18th April 2018

    The Black Tiger Group, a cybersecurity provider, is offering Asia customers packages that include threat intelligence, protection from cyber terrorism, and security of critical infrastructure, …

  • Training

    US Army examines training options

    1st May 2018

    The US Army is examining a number of new training initiatives to ensure the infantry retains overmatch as near-peer adversaries and terrorist organisations continue to …

Programme Results - Defence Insight

  • Fighter - multirole

    Penetrating Counter Air (PCA) [USA]

    Programme Background Requirement Originally conceived as a replacement for the F-22, the PCA was designed to counter various air threats, including integrated air defence systems ...

  • Minehunters

    Project SEA 1905 - MMCMMS [Australia]

    Programme Background Requirements Australia is looking to acquire up to eight new advanced mine countermeasures/hydrographic survey vessels under the Project SEA 1905 Maritime Mine Countermeasures ...

  • Military UAS - fixed-wing, Military UAS - MALE

    Collaborative Combat Aircraft (CCA) [USAF]

    Programme Background Requirements The programme's requirements are based on the USAF's belief that it requires mass to compete effectively with an adversary in symmetrical warfare. However, ...

  • APCs/IFVs - tracked

    XM30 Mechanized Infantry Combat Vehicle [USA]

    Programme Background Requirement The OMFV programme is the latest of several attempts to develop a Bradley replacement.  Designed to be capable of operating with or without ...

Equipment Results - Defence Insight

  • Major networking projects

    CoMotion Cyber

    Based upon CoMotion technology used in the Command Post of the Future, CoMotion Cyber provides individualised visualisation of a cyber common operational picture from diverse ...

  • Major networking projects

    Defending Against Cyberattacks

    NATO is developing measures to improve protection of its communication and information systems against attempts at disruption through attacks or illegal access. These efforts form ...

  • Land: Radio and SATCOM

    KG-255 X

    The NSA-certified ViaSat KG-255X combines Type 1 High Assurance Internet Protocol Encryptor (HAIPE) with the latest cyber defence technologies and visualisation software to allow secure ...

  • Data links

    Ruggedcom RX1500 Series

    The Ruggedcom RX1500 series, which consists of the RX5100 and the RX1501, is a layer 2/3 router and switch. Its modular and field-replaceable design allows ...

  • Subsystems: software

    Network Defense Trainer

    The Scalable Network Defense Trainer is an LVC simulation system for delivering realistic hands-on cyber training. It enables students to experience cyber attacks launched against ...

  • Data links

    Ruggedcom M969

    The Ruggedcom M969 is a hardened, managed Ethernet switch in a MIL-STD 901D rated package for protection against vibration and shock impacts. It is equipped ...

  • Data links

    Ruggedcom RX5000

    The Ruggedcom RX5000 multi-service platform integrated switch and router is designed for utility, industrial and military network applications. The RX5000 series has a high level ...

  • Military UAS - rotary-wing, Military UAS - small

    SpectroDrone

    At the HLS & Cyber Expo in Israel in November 2016, Laser Detect System (LDS) unveiled its SpectroDrone sensor. The system has been designed to ...

  • Major networking projects

    MADSS

    The Mission Assurance Decision Support Service (MADSS) will provide combatant commanders with a joint globally available common operating picture of network status supporting operations during ...

  • Military UAS - fixed-wing, Military UAS - small

    E-UAV

    In October 2021, the Jordan Design and Development Bureau (JODDB) unveiled the E-UAV at the Artificial Intelligence Defense Technology and Cyber Security Exhibition and Conference (AIDTSEC). The UAV is ...

  • Data links

    Ruggedcom RX1510 Series

    The Ruggedcom RX1510 series is a ruggedised layer 2/3 modular and field-replaceable routing/switching platform. Based on the embedded ROX II operating system, the RX1510 series ...

  • Subsystems: software

    Simulation Engine II

    The Simulation Engine II (SE II) commercial game engine is the first PC-based game engine to be developed by Sonalysts as a commercial product and ...

  • Land: COMINT and ELINT systems, Land: Electronic Attack - Jamming, Land: Integrated Defensive Systems

    Corvus- PECM

    Corvus is a multi-role, scalable platform supporting operations across Cyber and Electromagnetic Activities (CEMA). The Corvus architecture is rapidly reconfigurable to deliver force protection, individual ...

  • Loitering munitions, Military UAS - fixed-wing, Military UAS - small

    Dominator

    The Dominator is a loitering munition and UAV manufactured by AEVEX Aerospace. It has a twin-boom continuation with an inverted v-shaped tailplane. It can be utilised ...

  • Counter-UAS systems

    DroneSentryX

    DroneSentry-X is a cross-vehicle compatible, automated 360° detect and defeat device. It provides 360° awareness and protection using integrated sensors to detect and disrupt UAS. ...